A B C D E F G H I J K L M N O P R S T U V W Z
Ta Te Th To Tr
Tro Tru

Trojan Horse

A trojan horse is malware that disguises itself as legitimate software or content so a victim will install or run it. Trojans matter because they rely on deception, making them effective for initial access, surveillance, credential theft, and remote control.

What is a Trojan Horse?

Unlike a worm, a trojan usually does not self-replicate. Instead, it tricks a user into downloading, opening, or approving something that appears safe. Once activated, it may install backdoors, steal information, disable protections, or deliver additional malware.

Trojans are commonly hidden inside fake software, cracked applications, malicious attachments, browser downloads, and social engineering lures. The disguise is central to the attack.

Common Trojan Types

Common types include remote access trojans, banking trojans, downloader trojans, spyware trojans, and backdoor trojans. Different variants focus on different goals, but all depend on convincing the victim to trust the payload.

Trojan vs. Virus

A trojan relies on deception to get installed, while a virus is typically defined by its ability to attach to other files and spread when those files run. Both are malware, but they behave differently.

Frequently Asked Questions

How do trojans usually get onto devices?

They often arrive through phishing emails, fake downloads, pirated software, malicious ads, compromised websites, and misleading update prompts.

Can a trojan install other malware?

Yes. Many trojans act as loaders or backdoors that enable ransomware, spyware, credential theft tools, or remote access for follow-on attacks.

Related Cybersecurity Terms